Security Articles

Cryptojacking: Are You Protected Enough?

Cryptojacking: Are You Protected Enough?

Cryptojacking is the unauthorized use of your device e.g. computer, smartphone or tablet for mining cryptocurrencies. The most intriguing part is that you might completely remain unaware of your system being used as a cryptocurrency mining device. It is designed in such a way that it remains hidden from the user. The user might experience high CPU usage, slowness and overheat of the system without even realizing that the system is being used by someone else to mine cryptocurrencies.

Cloud Security and Privacy

Cloud computing is an emerging technology as it provides extensive below attributes.

Multitenancy-It is based on business model in which resources are shared i.e. multiple users can use the same resource at network level,host level and application level.

Massive Scalability- It provides the ability to scale to tens of thousands of systems, as well as the ability to massively scan bandwidth and storage space.

Elasticity-Computing resources can rapidly increases or decreases as per the need. Resources can also be released when they are no longer required.

Pay as you go-Users pay the resources they actually use and only for the time they required them.

Self-provisioning of resources-Users self-provisioning resources such as additional system(processing capability,software,storage) and network resources.


Common Pitfalls in Security Testing & Proactive Measures for Mitigation

The successful execution of a penetration testing activity or a testing program lies in our attitude, whether we intend to perceive it as a pure technical task or rather a functional and process oriented approach. Hackers majorly go with a technical mindset with the aim of breaking into the application or infrastructure element through automated scanners and manual scripts. However a responsible penetration testing subject matter experts rendering services to various clients, cannot afford to just wear a hacker’s hat rather need to play the game much more methodical and oriented. The aim definitely is to identify vulnerabilities in the target asset in a streamlined manner, by which the technical activity becomes inherent or subset as part of the overall process/functional approach.

Relying on antivirus? Bypassing antivirus is easier than you think

When it comes to securing a system especially a windows machine, people often rely just on antivirus. Most of the people have an assumption that having an antivirus installed will be enough to protect their machines from malicious programs and cybercriminals. It is true that antivirus programs are getting smart every day and antivirus vendors are working very hard to improve detection rates and reduce false positives. The same applies to the cybercriminals; every day the internet is getting flooded with plenty of tutorials that explain how to evade the antivirus programs. Some methods include advanced techniques like changing the behavior of the payloads and encrypting them, while some techniques require just running some simple tools. Let us explore one of the simplest methods that can bypass popular antiviruses like MacAfee, Kaspersky etc. 

8 pointer guide to secure data and applications on cloud

There has been an enormous increase in cyber-attacks in the recent past. The need for security of applications and data privacy is growing day by day. Enterprises need to be aware of the security of applications on the cloud. 

This guide provides a set of guidelines to protect data and applications on the cloud spread across SaaS, PaaS, IaaS and Private Cloud.

8 Pointer Guide to Protect & Safeguard Data and Applications on Cloud

1.    Strong Security Policy with defined protocols and process
2.    Restricted Privileged Access
3.    Protection of High-Value Cloud Assets
4.    Strong Multifactor Authentication
5.    Secure Application Development 
6.    Best in class Network Security 
7.    Middleware and Operating System Security
8.    Physical Security

Internet of Things – Security measures to be considered

The evolution of IoT has led to large bytes of data being shared with many participants. In fact, more sensitive data from sensors, industrial devices, mobiles, medical equipment etc. has been increasing tremendously. The growth in IoT has led to new ways in technology, media and telecommunications business creating values and revenue streams. 
This also has led to creating new opportunities for information compromise. As large amounts of sensitive information are being collected, communicated and analyzed there is largely a great risk in data and information compromise. 

At this juncture, the below pillars are very sensitive which leads to data and information leakage resulting in a major cyber flaw.

Introduction to Cloud Control Matrix (CCM)

Cloud Security Alliance (CSA) is a registered Foreign Non-Profit Corporation in Washington. It is founded in 2008. It provides fundamental security principles to cloud providers and assists cloud customers to ensure a secure cloud computing environment.

The Cloud Security Alliance Cloud Controls Matrix (CSA CCM) provides a controls framework that gives a detailed understanding of security concepts and principles that are applicable to the cloud industry. It also highlights its relationship to other industry-accepted security standards, regulations and controls frameworks such as ISO27001, ISACA, COBIT, PCIDSS, HIPAA, NIST, etc. The CSA CCM highlights information security control requirements, threats, and vulnerabilities in the cloud, and security measures to be implemented in the cloud.

Cyber Security - De-brief of Year 2018

As 2018 draws to a close, cybersecurity breaches continued unabated to make headlines and causing widespread damages to enterprises. The truth is that the nature of the threat from cyber-criminals is changing, becoming increasingly invisible, menacing and the attack surface broadening by the day, making it difficult to identify and protect from potential threats. From some recent attacks, we saw medium to large scale disruption to enterprise’s infrastructure, integrity compromise and loss of trust of its data. Cryptocurrency mining malware was one of the most prominent in exploiting human weaknesses. The modus operandi was to establish relationships with the target and then eventually execute the malware. It led to customer loss, legal actions and shareholder revolt. There are still gaps and attack vectors continue to elude traditional defenses.

Need of the hour: From traditional pen testing to crowdsourced pen testing

Web applications are getting more & more complex day after day. Cloud applications are getting increasingly API driven. And the code is deployed quite faster enough nowadays. That’s why security pen testing is changing and crowd sourcing model is in demand to resolve the issues that we face in traditional pen testing. We are focusing more on agile development and digital technologies are being used extensively.

Extending Single Sign-On to Cloud: Convenience or Does it Sacrifice Security

It's challenging enough for service providers to manage security for a single cloud service, let alone multiple cloud services. But many companies are pursuing a multi-cloud strategy, a reality that seemingly conflicts with customer expectations of bulletproof yet uncomplicated security policies. 

Customers are demanding single sign-on (SSO) capabilities, but providers and customers will have to ask themselves if the convenience of cloud SSO is worth its potential security risks.


Subscribe to RSS - Security Articles